Computer Networking A protocol is a set of rules governing a time sequence of events that must take place between an interface across an interface between modems between peers None of these between an interface across an interface between modems between peers None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system? None of these Identification procedure Log-on procedure Security procedure Safeguard procedure None of these Identification procedure Log-on procedure Security procedure Safeguard procedure ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an advantage to using fiber optics data transmission? fast data transmission rate resistance to data theft All of these low noise level few transmission errors fast data transmission rate resistance to data theft All of these low noise level few transmission errors ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a unicast address? Packets addressed to a unicast address are delivered to a single interface. These are like private addresses in IPv4 in that they are not meant to be routed. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. These are like private addresses in IPv4 in that they are not meant to be routed. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the clock rate determined? Supplied by the CSU/DSU By the far end router By the Physical layer bit stream timing By the clock rate command Supplied by the CSU/DSU By the far end router By the Physical layer bit stream timing By the clock rate command ANSWER DOWNLOAD EXAMIANS APP